Home
>
Courses
>
Certified Red Team Fundamentals (CRTF)
Course

Certified Red Team Fundamentals (CRTF)

The course offers introductory hands-on exploration of critical areas in cybersecurity, equipping participants with the necessary skills and knowledge to navigate security challenges.  Participants assume the role of a penetration testing team tasked with identifying and exposing vulnerabilities within an organization. This experiential learning approach ensures that learners gain practical experience in simulating real-world scenarios.

Hour Course Icon
Hours
6.5 Academic Hours
Format Course Icon
Format
Online/On-site
depends on the client's needs
Duration Course Icon
Duration
1 day

LIVE, instructor-led training

Throughout the course, participants gain hands-on experience with industry-standard tools and techniques, such as Nmap for network scanning, Exploit-db for vulnerability exploitation, and the manipulation of malicious Python scripts for privilege escalation. Additionally, the use of Hydra enhances understanding of password-based attacks in reconnaissance and exploitation scenarios.

An experienced instructor will be available to provide guidance and support as needed, allowing participants to focus on refining advanced skills and addressing complex, real-world challenges.

Throughout the course, participants gain hands-on experience with industry-standard tools and techniques, such as Nmap for network scanning, Exploit-db for vulnerability exploitation, and the manipulation of malicious Python scripts for privilege escalation. Additionally, the use of Hydra enhances understanding of password-based attacks in reconnaissance and exploitation scenarios.

An experienced instructor will be available to provide guidance and support as needed, allowing participants to focus on refining advanced skills and addressing complex, real-world challenges.

Learning Outcomes

Entry-Level Cybersecurity Students

• Novice Penetration Testers

• SOC Analysts/Engineers interested in Red Team activities

Key Topics Covered

1. Collection - Gathering intelligence and sensitive data efficiently and effectively.

2. Privilege Escalation - Understanding methods to gain elevated access within systems to exploit vulnerabilities.

3. Reconnaissance - Techniques and tools to gather information on systems and networks, featuring practical usage of Nmap for scanning and Hydra for password cracking, both for reconnaissance and exploitation.

4. Initial Access - Strategies and vectors through which adversaries gain their first foothold in a network or system.

5. File Analysis - Techniques for examining and interpreting files to detect malicious content or suspicious behavior.

6. Vulnerability Assessment - Techniques to identify and prioritize vulnerabilities in systems to bolster security posture.

7. Discovery - Identifying resources and services within a network environment to pinpoint potential security weaknesses.

8. Defense Evasion - Tactics to identify and develop countermeasures against evasion techniques used by threat actors to bypass existing security mechanisms.

Target Audience

Entry-Level Cybersecurity Students

• Novice Penetration Testers

• SOC Analysts/Engineers interested in Red Team activities

Required Prior Knowledge

• Solid foundation in cybersecurity principles.

Technical Requirements

Workstation Requirements

Google Chrome browser with Remote Desktop Protocol (RDP) support

Supported operating systems: Windows, Linux, or macOS

Chromebooks, tablets, and mobile phones are not supported

Participants using systems with restrictive security configurations (e.g., Endpoint Detection and Response [EDR] solutions) are advised to temporarily disable these features, as they may interfere with lab activities

When possible, participants are encouraged to use personal laptops to avoid organizational security restrictions

If format is ONLINE Network Requirements

A minimum of 3 Mbps of internet bandwidth per participant

No firewall restrictions that block required ports or IP addresses

Preferred network access configuration:

  • Whitelist *.cywaria.net/ and ensure access to port 8443

  • An unrestricted internet connection with no port or IP filtering is ideal

  • If feasible, participants are encouraged to bring or use personal mobile hotspots

Computing Requirements

Enroll
Arrow Icon

$ 999

* Special Launch Pricing - Act Fast
Enroll